Back to Home
minthcm icon

minthcm

by minthcm

Overview

Human Capital Management (HCM) system with employee management, appraisals, and task management functionalities, leveraging a CRM-based backend.

Installation

Run Command
No command provided

Environment Variables

  • DB_HOST
  • DB_PORT
  • DB_USERNAME
  • DB_PASSWORD
  • DB_NAME
  • DB_COLLATION
  • ELASTICSEARCH_HOST
  • ELASTICSEARCH_PORT
  • ELASTICSEARCH_USERNAME
  • ELASTICSEARCH_PASSWORD
  • SITE_URL
  • SYSTEM_ADMIN_NAME
  • SYSTEM_ADMIN_PASSWORD
  • ELASTICSEARCH_INDEX_PREFIX
  • SUITECRM_PHP_MIN_VERSION
  • SUITECRM_PHP_REC_VERSION
  • MINTHCM_PHP_MAX_VERSION

Security Notes

The server's source code contains multiple instances of `eval()` calls within core functionalities like KReports (`legacy/modules/KReports/KReport.php`, `legacy/modules/AOR_Reports/AOR_Report.php`) and AOW_WorkFlow (`legacy/modules/AOW_WorkFlow/AOW_WorkFlow.php`). If user input can influence the `$formula` variable or other dynamically evaluated strings, these can lead to severe Remote Code Execution (RCE) vulnerabilities. While some SQL queries appear to use parameterized statements (`$db->quoted()`, `$db->implodeQuoted()`), the presence of `eval()` makes the system highly susceptible to attacks. The installer (`install/Installer.php`, `legacy/install/install_utils.php`) uses `exec()` and `chmod()` for file system operations, which, while standard for installation, could be risky if not executed in a controlled environment. The `api/lib/Search/ElasticSearch/Operators/QueryString.php` uses a wildcard search which might be prone to injection if input is not fully sanitized for Elasticsearch. Overall, the direct use of `eval()` presents a critical security flaw.

Similar Servers

Stats

Interest Score49
Security Score2
Cost ClassMedium
Avg Tokens2500
Stars282
Forks62
Last Update2026-01-19

Tags

HCMHREmployee ManagementCRMPHPVue.jsWeb Application